Linux Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Linux platform. The techniques below are known to target hosts running Linux operating systems. The Matrix contains information for the Linux platform.

Initial Access Execution Persistence Privilege Escalation Stealth Defense Impairment Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
10 techniques 11 techniques 17 techniques 11 techniques 19 techniques 8 techniques 15 techniques 26 techniques 8 techniques 14 techniques 18 techniques 8 techniques 15 techniques
Initial Access Execution Persistence Privilege Escalation Stealth Defense Impairment Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
10 techniques 11 techniques 17 techniques 11 techniques 19 techniques 8 techniques 15 techniques 26 techniques 8 techniques 14 techniques 18 techniques 8 techniques 15 techniques